Looking for an Ubuntu Manual? Try This Book

1 month ago
Whether you’re new to Ubuntu or have been using it for years, The Ultimate Ubuntu Handbook offers a wealth of practical tips, time-saving tricks, and insider insights that will help you get even more out of your Ubuntu experience.
Abhishek Prakash

[Unstable Update] August 2025

1 month ago

Welcome to the new monthly unstable branch thread.

Recent News Kernel 6.15 is now EOL (click for more details) zabbix >= 7.4.1-2 may require manual intervention (click for more details) (click for more details) Notable Package Changes Known Issues 2025-07-20 - grub update 2:2.12.r292 -> r350 (click for more details) 2025-06-22 - linux-firmware-amdgpu-20250613.12fe085f may create an unbootable system for RDNA4 GPUs or graphical glitches with RDNA3 GPUs (click for more details) 2025-06-01 - avahi-discover python script (click for more details) Chrome/Chromium-based browsers and GNOME 48 - Global Shortcuts (click for more details) python-gobject 3.52 breaks multiple apps (libpeas related) (click for more details) Possible breaking changes to pacman-mirrors (click for more details) Plasma 6.4.0 will need manual intervention if you are on X11 (click for more details) Additional Info Info about AUR packages (click for more details)

Get our latest daily developer images now from Github: Plasma, GNOME, XFCE. You can get the latest stable releases of Manjaro from CDN77.

Check if your mirror has already synced:

48 posts - 17 participants

Read full topic

Yochanan

When Flatpak’s Sandbox Cracks: Real‑Life Security Issues Beyond the Ideal

1 month ago
by George Whittaker Introduction

Flatpak promises a secure runtime for Linux applications through container-like isolation, relying on bubblewrap namespaces, syscall filtering, and portal interfaces. In theory, each app should operate inside a strong sandbox, disconnected from the host system. But in reality, experience shows gaps, tiny cracks through which apps may escape with serious consequences.

The Sandbox Promise… and the Reality

Flatpak applications begin life in a highly-restricted environment: no network by default, no access to host files beyond the runtime and a private data directory, limited syscalls, and restricted access to session or system services. Portals provide a controlled channel for granting specific capabilities (e.g. file dialogs, screenshot, printing) without broad privileges.

Yet, many Flatpak packages declare broad permissions like filesystem=home, filesystem=host, or device=all. That effectively grants full read-write access to the user's home directory or even system devices, defeating the purpose of the sandbox in practice. Users often assume that 'sandboxed' means locked-down, but blanket permissions expose them to risk.

Real-World Breakouts from the Sandbox CVE‑2024‑32462: RequestBackground Portal Abuse

Security researcher Gergo Koteles uncovered a high-severity vulnerability where malicious Flatpak apps could craft a .desktop file via the org.freedesktop.portal.Background.RequestBackground interface. That tricked Flatpak’s --command= parsing into injecting bwrap arguments (e.g. --bind). This allowed arbitrary host commands to execute outside the sandbox boundary. Versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8 were affected. Patched in the listed versions and mitigated in xdg-desktop-portal 1.18.4 and newer.

CVE‑2024‑42472: Persistent Data Symlink Exploit

A Flatpak flag, --persist (or persistent= in manifest), allows apps writable storage within their data directory. But if a malicious install replaces that directory with a symlink pointing to sensitive host folders (e.g. ~/.ssh), the sandbox mount entry follows it into the real filesystem, giving the app unintended access to files outside its name-spaced area. All versions up to 1.14.8 and 1.15.x ≤ 1.15.9 are vulnerable; patched in 1.14.10 and 1.15.10+.

Policy Complexity and Ecosystem Slip-Ups

A detailed study of hundreds of Flatpak and Snap packages found that nearly 42% of Flatpak apps either override the supposed isolation or misconfigure sandboxing, resulting in overprivilege or potential escape paths. Crafting fine-grained sandbox policy is hard, and mistakes slip through easily.

Go to Full Article
George Whittaker

[Testing Update] 2025-07-30 - QEmu, Firefox Beta, Tuxedo Drivers, Slimbook Service

1 month ago

Hello community, here we have another set of package updates.

Current Promotions Recent News Valkey to replace Redis in the [extra] Repository (click for more details) Previous News Finding information easier about Manjaro (click for more details) Notable Package Updates Additional Info Python 3.13 info (click for more details) Info about AUR packages (click for more details)

Get our latest daily developer images now from Github: Plasma, GNOME, XFCE. You can get the latest stable releases of Manjaro from CDN77.

Our current supported kernels
  • linux54 5.4.296
  • linux510 5.10.240
  • linux515 5.15.189
  • linux61 6.1.147
  • linux66 6.6.100
  • linux612 6.12.40
  • linux615 6.15.8
  • linux616 6.16.0
  • linux61-rt 6.1.146_rt53
  • linux66-rt 6.6.99_rt58
  • linux612-rt 6.12.39_rt11
  • linux615-rt 6.15.0_rt2

Package Changes (Wed Jul 30 21:10:49 CEST 2025)

  • testing core x86_64: 5 new and 5 removed package(s)
  • testing extra x86_64: 1058 new and 1050 removed package(s)
  • testing multilib x86_64: 2 new and 2 removed package(s)

Overlay Changes

  • testing core x86_64: 11 new and 11 removed package(s)
  • testing extra x86_64: 34 new and 37 removed package(s)

A list of all changes can be found here.

Click to view the poll.

Check if your mirror has already synced:

3 posts - 3 participants

Read full topic

philm

Internxt: Secure Open-Source Cloud Storage for Linux Users (87% Off)

1 month ago
The post Internxt: Secure Open-Source Cloud Storage for Linux Users (87% Off) first appeared on Tecmint: Linux Howtos, Tutorials & Guides .

There are countless cloud storage platforms that provide safe and secure storage space for your files. Popular cloud storage apps

The post Internxt: Secure Open-Source Cloud Storage for Linux Users (87% Off) first appeared on Tecmint: Linux Howtos, Tutorials & Guides.
James Kiarie

Veil of Vigilance: Tails 6.0’s New Frontiers in Surveillance Resistance

1 month ago
by George Whittaker Opening the Curtain on Tails 6.0

On February 27, 2024, the Tails Project unveiled version 6.0, a milestone release built atop Debian 12 “Bookworm” and GNOME 43 . Tails, short for The Amnesic Incognito Live System, is engineered from the ground up to prevent data leakage, protect against targeted surveillance, and ensure that every use leaves no trace unless explicitly permitted . Version 6.0 refines this mission with a bold suite of features tailored to block modern surveillance tactics.

USB Integrity: Stopping Sneaky Hardware Threats Warnings for Persistent Storage Failures

Live USBs are critical lifelines for persistence in Tails. Now, Tails 6.0 alerts users when underlying storage suffers read/write errors. This early detection, prior to catastrophic data loss, allows users to back up their encrypted areas before disaster strikes .

Defense Against Rogue USB Devices

One of the stealthiest attack vectors involves plugging in malicious USB gear while a device is unattended. Tails now ignores any USB device connected while the screen is locked. Only when the screen is unlocked can new USB devices be activated, closing the door on rubber‑duckying-style malware delivery .

Usability Upgrades That Don’t Sacrifice Security Automatic Device Mounting with Safeguards

Plug in a flash drive or encrypted external disk while Tails is unlocked, and the system now instantly mounts the device and prompts for decryption (e.g. VeraCrypt volumes), smoothing workflow while preserving safeguards .

Ambient Display Options for Privacy-Conscious Use

GNOME 43 brings native support for dark mode, night‑light warm tones, or combinations thereof, all accessible via the system menu. These modes reduce eye strain and lower screen glare in sensitive situations, minimizing accidental disclosure in low-light settings .

Simplified Screenshots and Screencast Access

Through a redesigned system menu, users can now take screenshots or record screencasts with a few clicks—reducing reliance on external tools and minimizing exposure via unnecessary browser or app use .

Streamlined Gmail Setup in Thunderbird

Configuring a Gmail account is now smoother: Tails 6.0 allows direct sign‑in within Thunderbird using standard two-step verification, no manual IMAP or security adjustments required, eliminating error-prone manual steps .

Go to Full Article
George Whittaker